Joint task force transformation initiative



Yüklə 5,64 Mb.
səhifə108/186
tarix08.01.2019
ölçüsü5,64 Mb.
#93199
1   ...   104   105   106   107   108   109   110   111   ...   186

P1

LOW PE-3

MOD PE-3

HIGH PE-3 (1)



PE-4 ACCESS CONTROL FOR TRANSMISSION MEDIUM


Control: The organization controls physical access to [Assignment: organization-defined information system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security safeguards].

Supplemental Guidance: Physical security safeguards applied to information system distribution and transmission lines help to prevent accidental damage, disruption, and physical tampering. In addition, physical safeguards may be necessary to help prevent eavesdropping or in transit modification of unencrypted transmissions. Security safeguards to control physical access to system distribution and transmission lines include, for example: (i) locked wiring closets; (ii) disconnected or locked spare jacks; and/or (iii) protection of cabling by conduit or cable trays. Related controls: MP-2, MP-4, PE-2, PE-3, PE-5, SC-7, SC-8.

Control Enhancements: None.

References: NSTISSI No. 7003.

Priority and Baseline Allocation:

P1

LOW Not Selected

MOD PE-4

HIGH PE-4



PE-5 ACCESS CONTROL FOR OUTPUT DEVICES


Control: The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.

Supplemental Guidance: Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices. Related controls: PE-2, PE-3, PE-4, PE-18.

Control Enhancements:

  1. access control for output devices | access to output by authorized individuals

The organization:

    1. Controls physical access to output from [Assignment: organization-defined output devices]; and

    2. Ensures that only authorized individuals receive output from the device.

Supplemental Guidance: Controlling physical access to selected output devices includes, for example, placing printers, copiers, and facsimile machines in controlled areas with keypad access controls or limiting access to individuals with certain types of badges.

  1. access control for output devices | access to output by individual identity

The information system:

    1. Controls physical access to output from [Assignment: organization-defined output devices]; and

    2. Links individual identity to receipt of the output from the device.

Supplemental Guidance: Controlling physical access to selected output devices includes, for example, installing security functionality on printers, copiers, and facsimile machines that allows organizations to implement authentication (e.g., using a PIN or hardware token) on output devices prior to the release of output to individuals.

  1. access control for output devices | marking output devices

The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.

Supplemental Guidance: Outputs devices include, for example, printers, monitors, facsimile machines, scanners, copiers, and audio devices. This control enhancement is generally applicable to information system output devices other than mobiles devices.

References: None.

Priority and Baseline Allocation:

P2

LOW Not Selected

MOD PE-5

HIGH PE-5


Yüklə 5,64 Mb.

Dostları ilə paylaş:
1   ...   104   105   106   107   108   109   110   111   ...   186




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin